[Bug 1655510] [NEW] CVE-2016-9190 Remote code execution through crafted file in pillow < 3.3.2

Wicher Minnaard wicher at gavagai.eu
Wed Jan 11 01:03:56 UTC 2017


Public bug reported:

See https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9190 for
details.

I could not find signs of any backport of a fix in the changelog, currently at 3.1.2-0ubuntu1:
https://launchpad.net/ubuntu/xenial/+source/pillow/+changelog

This particular vuln is fixed in pillow 3.3.2, however, there is a bunch
of other CVEs filed against pillow < 3.4.x, see the bottom of this
report.

IIUC there are two strategies available for creating an update through
the security releases channel: 1) backporting the specific fixes, or 2)
simply bumping the package to a version in which these vulnerabilities
are fixed.

For strategy 2 (probably the cheapest one in terms of effort), I had a
look at the Pillow changelog to see whether there are any backwards
incompatible API changes which would prevent a simple bump. It appears
there are:

Backwards incompatible API changes:
https://pillow.readthedocs.io/en/latest/releasenotes/3.3.0.html#image-metadata
https://pillow.readthedocs.io/en/latest/releasenotes/3.4.0.html#image-core-open-ppm-removed

The latter might not be much of an issue, but the first one may break
software that's counting on the pre-3.3.0 behaviour. Hope this helps!


CVE list (per the Gentoo Linux security advisory): https://archives.gentoo.org/gentoo-announce/message/23306519cb5f9b1a2e438b0797368308

** Affects: pillow (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to pillow in Ubuntu.
https://bugs.launchpad.net/bugs/1655510

Title:
  CVE-2016-9190 Remote code execution through crafted file in pillow <
  3.3.2

Status in pillow package in Ubuntu:
  New

Bug description:
  See https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9190 for
  details.

  I could not find signs of any backport of a fix in the changelog, currently at 3.1.2-0ubuntu1:
  https://launchpad.net/ubuntu/xenial/+source/pillow/+changelog

  This particular vuln is fixed in pillow 3.3.2, however, there is a
  bunch of other CVEs filed against pillow < 3.4.x, see the bottom of
  this report.

  IIUC there are two strategies available for creating an update through
  the security releases channel: 1) backporting the specific fixes, or
  2) simply bumping the package to a version in which these
  vulnerabilities are fixed.

  For strategy 2 (probably the cheapest one in terms of effort), I had a
  look at the Pillow changelog to see whether there are any backwards
  incompatible API changes which would prevent a simple bump. It appears
  there are:

  Backwards incompatible API changes:
  https://pillow.readthedocs.io/en/latest/releasenotes/3.3.0.html#image-metadata
  https://pillow.readthedocs.io/en/latest/releasenotes/3.4.0.html#image-core-open-ppm-removed

  The latter might not be much of an issue, but the first one may break
  software that's counting on the pre-3.3.0 behaviour. Hope this helps!

  
  CVE list (per the Gentoo Linux security advisory): https://archives.gentoo.org/gentoo-announce/message/23306519cb5f9b1a2e438b0797368308

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pillow/+bug/1655510/+subscriptions



More information about the foundations-bugs mailing list